Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.194.236.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3164
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.194.236.106.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:38:04 CST 2025
;; MSG SIZE  rcvd: 108
Host info
106.236.194.145.in-addr.arpa domain name pointer 145.194.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.236.194.145.in-addr.arpa	name = 145.194.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
154.236.160.171 attackbotsspam
SMB Server BruteForce Attack
2020-06-16 00:39:02
125.91.32.65 attackspambots
Jun 15 11:32:38 Tower sshd[22842]: Connection from 125.91.32.65 port 48515 on 192.168.10.220 port 22 rdomain ""
Jun 15 11:32:47 Tower sshd[22842]: Invalid user ag from 125.91.32.65 port 48515
Jun 15 11:32:47 Tower sshd[22842]: error: Could not get shadow information for NOUSER
Jun 15 11:32:47 Tower sshd[22842]: Failed password for invalid user ag from 125.91.32.65 port 48515 ssh2
2020-06-16 01:11:31
72.255.62.117 attackspam
SMB Server BruteForce Attack
2020-06-16 00:35:41
49.233.88.25 attackspambots
2020-06-15T16:51:22.008184shield sshd\[22803\]: Invalid user ankesh from 49.233.88.25 port 48956
2020-06-15T16:51:22.012054shield sshd\[22803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.88.25
2020-06-15T16:51:24.291865shield sshd\[22803\]: Failed password for invalid user ankesh from 49.233.88.25 port 48956 ssh2
2020-06-15T16:53:06.223718shield sshd\[23457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.88.25  user=root
2020-06-15T16:53:08.448867shield sshd\[23457\]: Failed password for root from 49.233.88.25 port 38976 ssh2
2020-06-16 00:57:06
51.75.249.224 attack
Invalid user ebs from 51.75.249.224 port 38276
2020-06-16 00:47:00
171.220.243.213 attackspam
SSH Brute-Force attacks
2020-06-16 01:10:17
200.38.232.94 attackspambots
Automatic report - Port Scan Attack
2020-06-16 00:57:57
109.94.23.227 attack
Bruteforce detected by fail2ban
2020-06-16 01:05:42
49.234.43.224 attackbots
Jun 15 16:23:13 ns381471 sshd[5089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.43.224
Jun 15 16:23:15 ns381471 sshd[5089]: Failed password for invalid user wzp from 49.234.43.224 port 39810 ssh2
2020-06-16 00:57:32
222.209.85.197 attack
Jun 15 14:17:08 vmd17057 sshd[5679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.209.85.197 
Jun 15 14:17:10 vmd17057 sshd[5679]: Failed password for invalid user deploy from 222.209.85.197 port 60476 ssh2
...
2020-06-16 01:08:12
151.84.135.188 attack
Jun 16 01:33:29 localhost sshd[1711148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.84.135.188  user=root
Jun 16 01:33:31 localhost sshd[1711148]: Failed password for root from 151.84.135.188 port 40610 ssh2
...
2020-06-16 01:14:19
173.239.232.119 attackspam
Fail2Ban Ban Triggered
2020-06-16 00:41:42
183.134.91.53 attackbots
Jun 15 17:24:30 host sshd[2038]: Invalid user test from 183.134.91.53 port 44136
...
2020-06-16 00:59:14
178.216.248.36 attackbotsspam
2020-06-15T16:37:09.986393shield sshd\[18944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.216.248.36  user=root
2020-06-15T16:37:12.167404shield sshd\[18944\]: Failed password for root from 178.216.248.36 port 34168 ssh2
2020-06-15T16:40:23.259174shield sshd\[19801\]: Invalid user adu from 178.216.248.36 port 55962
2020-06-15T16:40:23.263915shield sshd\[19801\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.216.248.36
2020-06-15T16:40:25.408886shield sshd\[19801\]: Failed password for invalid user adu from 178.216.248.36 port 55962 ssh2
2020-06-16 00:44:34
68.183.157.97 attack
Jun 15 17:22:39 home sshd[11615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.157.97
Jun 15 17:22:41 home sshd[11615]: Failed password for invalid user igor from 68.183.157.97 port 54950 ssh2
Jun 15 17:25:45 home sshd[11932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.157.97
...
2020-06-16 00:49:12

Recently Reported IPs

25.45.160.24 49.246.56.12 229.130.37.87 15.87.250.104
8.189.174.52 131.88.193.244 34.35.12.155 137.110.199.57
181.95.134.153 155.40.130.216 49.152.130.206 6.210.1.59
115.92.171.145 226.91.254.163 39.248.42.98 78.140.249.123
239.88.65.76 191.54.194.241 215.110.18.188 95.10.211.203